CN104951689A - Bridge type encryption and decryption chip card - Google Patents
Bridge type encryption and decryption chip card Download PDFInfo
- Publication number
- CN104951689A CN104951689A CN201510419338.5A CN201510419338A CN104951689A CN 104951689 A CN104951689 A CN 104951689A CN 201510419338 A CN201510419338 A CN 201510419338A CN 104951689 A CN104951689 A CN 104951689A
- Authority
- CN
- China
- Prior art keywords
- memory assembly
- access
- request
- physical
- chip card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000875 corresponding Effects 0.000 claims description 46
- 238000005192 partition Methods 0.000 abstract description 3
- 238000000034 method Methods 0.000 description 15
- 238000003860 storage Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 3
- 238000006011 modification reaction Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 230000003287 optical Effects 0.000 description 2
- 241000931705 Cicada Species 0.000 description 1
- 210000000088 Lip Anatomy 0.000 description 1
- 210000001747 Pupil Anatomy 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Abstract
The invention provides a bridge type encryption and decryption chip card capable of connecting a main board and a memory module. The bridge type encryption and decryption chip card comprises an authentication module and an encryption and decryption module, wherein the authentication module is used for judging the legitimacy of access requests for different areas of the memory module; the encryption and decryption module is used for encrypting data written into the memory module when the authentication module judges that the access requests are legal, and decrypting the data when the main board reads the data of the memory module. According to the bridge type encryption and decryption chip card, each operation of a user can be authenticated when the user is authenticated, and the memory module can be used as a system boot disk through partition of the areas of the memory module.
Description
Technical field
The application relates to field of computer information security, particularly relates to a kind of bridge-type deciphering chip card.
Background technology
Along with the develop rapidly of infotech, computing equipment gos deep into all trades and professions, and while bringing convenience for people's life, the attack of hacker and virus becomes the biggest threat of information security, how to ensure that the safety of personal data becomes the problem needing solution badly.
At present, be adopt cryptoguard to the modal protected mode of personal information, but owing to there is password loss, the problem such as easily crack, be only applicable in the lower information protection of level of security.Another kind of mode uses hard disk encryption card to carry out hardware encryption to the data in memory device, but which exists following problem: one, owing to carrying out hardware encryption to whole memory device, memory device cannot be used as system boot disk; Two, owing to only carrying out certification to the legitimacy of user, once crack user cipher or access authentication USB Key, then the content of DISK to Image can be cracked.
Summary of the invention
In view of this, the application provides a kind of bridge-type deciphering chip card, while carrying out certification to user, can carry out certification to each operation of user, and by the division to memory assembly region, makes memory assembly can be used as system boot disk and use.
The application provides a kind of bridge-type deciphering chip card connecting mainboard and memory assembly, and this chip card comprises: authentication module, for judging the legitimacy of the request of access to memory assembly zones of different; Encryption/decryption module, when authentication module certification request of access is legal, is encrypted the data of write memory assembly, and when mainboard reads the data of memory assembly to data deciphering.
Wherein this bridge-type deciphering chip card also comprises storer, corresponding table is stored in this storer, the corresponding relation that memory assembly zones of different and physical certifying operate is preserved in this correspondence table, when authentication module receives the request of access to memory assembly zones of different, authentication module searches for this correspondence table, obtains the physical operations that this request of access is corresponding.
This chip card is connected with physical certifying device, and this physical certifying device can receive the physical operations of user's input.
Further, the physical operations that the physical operations corresponding with request of access obtained and user are inputted by physical certifying device compares by authentication module, if the two is consistent, then judges that this request of access is legal, otherwise judge that request of access is illegal, refuse this request of access.
The application also comprises a kind of encipher-decipher method, and the method comprises the steps: to receive the request of access to memory assembly zones of different; The corresponding table of search, obtains the physical operations that this request of access is corresponding; The physical operations that prompting user input is corresponding with this request of access; Judge that whether the physical operations that user inputs is consistent with the physical operations obtained from corresponding table; If consistent, perform and the encryption and decryption of memory assembly is operated.
Wherein preserve the corresponding relation that memory assembly zones of different and physical certifying operate in this correspondence table.
Further, this request of access comprises the instruction conducted interviews to which region of memory assembly.
The method also comprises the operation in advance memory assembly being carried out to Region dividing, by corresponding with physical operations for the region divided, and preserves the corresponding table of memory assembly zones of different and physical operations.
Encryption and decryption operation wherein comprises: be encrypted the data of write memory assembly, and when mainboard reads the data of memory assembly to data deciphering.
The application also comprises a kind of bridge chip card encrypting and deciphering system, and this system comprises mainboard and memory assembly, and bridge-type deciphering chip card as above.
The application is by dividing the region of memory assembly in advance; make memory assembly can be used as system boot disk to use; the corresponding relation of regional and user's physical operations is set simultaneously; thus accomplish that different memory areas has different protection levels, and the object of the physical operations of user being carried out to certification can be realized.Further, bridge-type deciphering chip card is set between mainboard and memory assembly, realize multiple authentication, namely after authenticated legitimacy, can the legitimacy of every physical operations of authenticated further, by the application, when not increasing added burden, achieve and the multi-enciphering of memory data and point rank of memory assembly are used, to meet the demand of different user.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the application, for those of ordinary skill in the art, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the system construction drawing of the application's bridge-type deciphering chip card;
Fig. 2 is the structural drawing of the application's bridge-type deciphering chip card;
Fig. 3 is the structural drawing of the application's memory assembly;
Fig. 4 is the workflow diagram of the application's encipher-decipher method.
Embodiment
Technical scheme in the application is understood better in order to make those skilled in the art, below in conjunction with the accompanying drawing in the embodiment of the present application, technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art obtain, all should belong to the scope of the application's protection.
The application's specific implementation is further illustrated below in conjunction with illustrations.
The application provides a kind of bridge-type deciphering chip system, as shown in Figure 1, comprises mainboard 1, bridge-type deciphering chip card 2, memory assembly 3 and physical certifying device 4.
Mainboard 1 can be various types of commercially available mainboard, comprise the various software and hardwares required for computing equipment, such as CPU, BIOS etc., mainboard 1 can connect display device, mainboard 1 can send various instruction to bridge-type deciphering chip card 2, as the instruction of read-write memory assembly 3, and write data by bridge-type deciphering chip card 2 to memory assembly 3, or the data of readout memory assembly 3.
Memory assembly 3 is for storage encryption data, and it can be one or more the combination such as random access memory, hard disk, flash memory.Memory assembly can be carried out Region dividing according to the type of stored data, its structure such as shown in Figure 3, can comprise public domain 301, data area 302, application area 303 etc.Wherein public domain 301 can store the data without the need to physical certifying, such as, when system starts required data, thus makes this memory assembly 3 can be used as the use of system boot disk because of the existence of public domain 301.The various application datas that data area 302 uses in using for storage system.Various application programs during application area 303 uses for storage system.Can Further Division memory assembly according to actual needs.Or also can according to the region of data confidentiality partition of the level memory assembly, such as according to without the need to physical certifying, need cipher authentication, need biological identification etc. to divide the region of memory assembly.
Bridge-type deciphering chip card 2 is connected with mainboard 1 and memory assembly 3, and realize connecting by wired or wireless mode, the structure of bridge-type deciphering chip card 2 as shown in Figure 2, comprises authentication module 201, encryption/decryption module 202 and storer 203.Wherein the corresponding table of memory assembly zones of different and physical operations preserved by storer 203.This table can be as follows:
The region of memory assembly | Physical operations |
Public domain | Without the need to physical operations |
Data area | Finger print identifying |
Application area | Press specific button twice |
…… | …… |
Table 1
Those skilled in the art are known, upper table is exemplary instruction card, and memory assembly region can divide according to actual needs, and the physical operations of its correspondence also can be arranged according to the situation of reality, such as, when not possessing fingerprint scanner, other physical certifying modes can be selected.
Authentication module 201 resolves the request of access that mainboard 1 sends, this request of access comprises the instruction conducted interviews to which region of memory assembly, authentication module 201 is by resolving this request of access, thus obtain the region which memory assembly this request of access need to read, such as authentication module 201 obtains request of access to be needed to read public domain, the correspondence table that authentication module 201 stores by consulting storer 203, namely table 1 is gone up, obtain public domain without the need to physical certifying, then this request of access is transmitted to encryption/decryption module 202 by authentication module 201.Encryption/decryption module 202 is encrypted according to the data of request of access to write memory assembly, or when mainboard reads the data of memory assembly to data deciphering.
If authentication module 201 is by look-up table 1, find that this request of access needs physical certifying to operate, be designated as physical operations 1, then authentication module 201 sends signal to physical certifying device 4, user is pointed out to input the physical certifying corresponding to request of access by physical certifying device 4, also this information can be sent to mainboard 1, the display device connected by mainboard 1, sends information to user.User is according to this information, corresponding physical operations is inputted by physical certifying device 4, be designated as physical operations 2, the physical operations that this user inputs by physical certifying device 4 and physical operations 2 send to authentication module 201, above-mentioned physical operations 1 and physical operations 2 are compared by authentication module 201, if the two is consistent, then authentication module 201 forwards this access to encryption/decryption module 202 and asks clearly, encryption/decryption module 202 is encrypted according to the data of request of access to write memory assembly, or when mainboard reads the data of memory assembly to data deciphering.If inconsistent, prompting user re-enters, and till user inputs correctly, also can set input number of times, such as, input three times, can send warning message after more than three times, and this warning message can be sound, one or more optical, electrical combinations.Also on mainboard 1, bridge-type deciphering chip card 2 or physical certifying device 4, Wireless/wired warning device can be installed, information is sent to predetermined remote machine by warning device, the mobile phone of such as user, or remote server, prompting has disabled user to use memory assembly 3.
Need to read application area for request of access below, sketch the course of work of above-mentioned authentication module 201.Authentication module 201 is by resolving request of access, obtain this request of access and need access application region, then authentication module 201 consults the memory assembly zones of different of storer 203 storage and the corresponding table of physical operations, namely table 1 is gone up, the physical operations obtained corresponding to application area presses specific button twice, then authentication module 201 sends information to physical certifying device 4 or mainboard 1, the physical operations that prompting user input is corresponding with this request of access, this information such as can be: ask the physical operations required for input reference application area.User is according to this information operating physical authenticate device 4, the physical operations that user inputs is sent to authentication module 201 by physical certifying device 4, whether namely the physical operations that authentication module 201 compares user's input and the physical operations of reading from table 1 press specific button twice consistent, if inconsistent, prompting user re-enters, if consistent, authentication module 201 forwards this request of access to encryption/decryption module 202, encryption/decryption module 202 is encrypted according to the data of request of access to write memory assembly 3, or when mainboard reads the data of memory assembly 3 to data deciphering.
Bridge-type deciphering chip card 2 also comprises encryption/decryption module 202, encryption/decryption module 202 is when the request of access of authentication module 201 authenticated is legal, judge that request of access reads or write order, if need the data of readout memory assembly, then encryption/decryption module 202 reads the data be stored in memory assembly 3 needed for request of access, and is decrypted the enciphered data read; If mainboard needs write memory set event data, then encryption/decryption module 202 is encrypted needing the data of write, and by the respective regions of the data after encryption stored in the memory assembly of specifying in request of access.
Return Fig. 1, this bridge-type deciphering chip system also comprises physical certifying device 4, this physical certifying device 4 is connected to bridge-type deciphering chip card 2, receive the instruction that bridge-type deciphering chip card 2 sends, this physical certifying device can be selected according to actual needs whether to assemble display device, if this physical certifying device is assembled with display device, by this display device, information is sent to user, the physical operations that prompting user input is corresponding with its request of access, and receive the physical operations of user's input, this physical operations can comprise living things feature recognition operation and operating characteristics identifying operation, living things feature recognition operation can include but not limited to fingerprint input operation, pupil is taken a picture, lip feature identifying operation etc., operating characteristics identifying operation can comprise button operation etc., other operation carrying out certification by physics mode input is also applicable to the present invention.The physical operations that the user of acquisition inputs is transmitted to bridge-type deciphering chip card 2 by physical certifying device 4, identifies that whether the physical operations that user inputs is correct by bridge-type deciphering chip card 2.
The structure of bridge-type deciphering chip system is described above according to Fig. 1-3, and all parts in this system, the particularly structure of bridge-type deciphering chip card, below in conjunction with Fig. 4, the workflow of this bridge-type deciphering chip card is described.
As shown in Figure 4, the encipher-decipher method of bridge-type deciphering chip card comprises the steps:
Step 401, receive request of access to memory assembly zones of different.
The authentication module 201 of bridge-type deciphering chip card receives request of access from mainboard, this request of access comprises the instruction conducted interviews to which region of memory assembly 3, authentication module 201 by resolving this request of access, thus obtains the region which memory assembly this request of access need to read.
Step 402, the corresponding table of search, obtain the physical operations that this request of access is corresponding.
For realizing step 402, this system needs to perform following sub-step in advance:
P1, in advance memory assembly is carried out to the operation of Region dividing.
Memory assembly can be carried out Region dividing according to the type of stored data, its structure such as shown in Fig. 3, can comprise public domain 301, data area 302, application area 303 etc.Wherein public domain 301 can store the data without the need to physical certifying, such as, when system starts required data, thus makes this memory assembly 3 can be used as the use of system boot disk because of the existence of public domain 301.The various application datas that data area 302 uses in using for storage system.Various application programs during application area 303 uses for storage system.Can Further Division memory assembly according to actual needs.Or also can according to the region of data confidentiality partition of the level memory assembly, such as according to without the need to physical certifying, need cipher authentication, need biological identification etc. to divide the region of memory assembly.
P2, by corresponding with physical operations for the region divided, and preserve the corresponding table of memory assembly zones of different and physical operations.
The corresponding table of memory assembly zones of different and physical operations preserved by the storer 203 of bridge-type deciphering chip card.This table can be as follows:
The region of memory assembly | Physical operations |
Public domain | Without the need to physical operations |
Data area | Finger print identifying |
Application area | Press specific button twice |
…… | …… |
Table 1
Those skilled in the art are known, upper table is exemplary instruction card, and memory assembly region can divide according to actual needs, and the physical operations of its correspondence also can be arranged according to the situation of reality, such as, when not possessing fingerprint scanner, other physical certifying modes can be selected.
This correspondence table is preserved in the storer 203 of bridge-type deciphering chip card 2, and receiving the request of access to memory assembly 3, and when obtaining the instruction in which the memory assembly region of access indicated in request of access, by consulting corresponding table, namely table 1 is gone up, obtain this physical operations corresponding to memory assembly region, and preserve this physical operations, be designated as physical operations 1.
Step 403, prompting user input the physical operations corresponding with this request of access.
Point out user to input the physical certifying corresponding to request of access by physical certifying device 4, also this information can be sent to mainboard 1, the display device connected by mainboard 1, sends information to user.User, according to this information, inputs corresponding physical operations by physical certifying device 4, is designated as physical operations 2, and the physical operations that this user inputs is sent to authentication module 201 by physical certifying device 4.
Step 404, judge that whether the physical operations that user inputs is consistent with the physical operations obtained from corresponding table.
Bridge-type deciphering chip card 2 judges that whether the physical operations that namely physical operations that the physical operations 2 i.e. user received inputs and the physical operations 1 of its preservation obtain from corresponding table is consistent.This by aspect ratio to realization, whether the fingerprint such as inputted is consistent with the fingerprint in correspondence table, or whether the button of pressing is consistent with the specific button in corresponding table, also other features can be comprised during concrete judgement, such as press interval duration during button twice, if two minor tick durations exceed predetermined threshold, then user can be pointed out to re-enter.
If step 405 is consistent, performs and the encryption and decryption of memory assembly is operated.
Encryption/decryption module 202 is when the request of access of authentication module 201 authenticated is legal, judge that request of access reads or write order, if need the data of readout memory assembly, then encryption/decryption module 202 reads the data be stored in storage component part 3 needed for request of access, and is decrypted the enciphered data read; If mainboard needs write memory set event data, then encryption/decryption module 202 is encrypted needing the data of write, and by the respective regions of the data after encryption stored in the memory assembly of specifying in request of access.
Need to read application area for request of access below, sketch the above-mentioned course of work.Authentication module 201 receives request of access, first this request of access is resolved, obtain this request of access and need access application region, then authentication module 201 consults the memory assembly zones of different of storer 203 storage and the corresponding table of physical operations, namely table 1 is gone up, the physical operations obtained corresponding to application area presses specific button twice, then authentication module 201 sends information to physical certifying device 4 or mainboard 1, the physical operations that prompting user input is corresponding with this request of access, this information such as can be: clear physical operations required for input reference application area.User is according to this information operating physical authenticate device 4, the physical operations that user inputs is sent to authentication module 201 by physical certifying device 4, whether namely the physical operations that authentication module 201 compares user's input and the physical operations of reading from table 1 press specific button twice consistent, if inconsistent, prompting user re-enters, if consistent, authentication module 201 forwards this request of access to encryption/decryption module 202, encryption/decryption module 202 is encrypted according to the data of request of access to write memory assembly 3, or when mainboard reads the data of memory assembly 3 to data deciphering.
More than discuss the process of when user operates memory assembly, this operation being carried out to physical certifying, first the application also can carry out the certification of user when bridge-type deciphering chip card start-up, this inputs password by user, press fingerprint, or insert the authentication modes such as USB Key to realize, at this moment, only have and the certification of user identity is passed through, such as have input correct password, fingerprint or key comparison correct, this bridge-type deciphering chip card could receive the request of access of mainboard, otherwise this bridge-type deciphering chip card cannot receive the request of access of mainboard.The application, by arranging multi-enciphering mechanism, further ensures the security of data.
It will be understood by those skilled in the art that the embodiment of the application can be provided as method, device (equipment) or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The application describes with reference to according to the process flow diagram of the method for the embodiment of the present application, device (equipment) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Although described the preferred embodiment of the application, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the application's scope.Obviously, those skilled in the art can carry out various change and modification to the application and not depart from the spirit and scope of the application.Like this, if these amendments of the application and modification belong within the scope of the application's claim and equivalent technologies thereof, then the application is also intended to comprise these change and modification.
Claims (10)
1. can connect a bridge-type deciphering chip card for mainboard and memory assembly, comprise:
Authentication module, for judging the legitimacy of the request of access to memory assembly zones of different;
Encryption/decryption module, when authentication module certification request of access is legal, is encrypted the data of write memory assembly, and when mainboard reads the data of memory assembly to data deciphering.
2. bridge-type deciphering chip card as claimed in claim 1, wherein this bridge-type deciphering chip card also comprises storer, corresponding table is stored in this storer, the corresponding relation that memory assembly zones of different and physical certifying operate is preserved in this correspondence table, when authentication module receives the request of access to memory assembly zones of different, authentication module searches for this correspondence table, obtains the physical operations corresponding with this request of access.
3. bridge-type deciphering chip card as claimed in claim 2, this chip card is connected with physical certifying device, and this physical certifying device can receive the physical operations of user's input.
4. bridge-type deciphering chip card as claimed in claim 3, the physical operations that the physical operations corresponding with request of access obtained and user are inputted by physical certifying device compares by authentication module, if the two is consistent, then judge that this request of access is legal, otherwise judge that request of access is illegal, refuse this request of access.
5. an encipher-decipher method, comprises the steps:
Receive the request of access to memory assembly zones of different;
The corresponding table of search, obtains the physical operations that this request of access is corresponding;
The physical operations that prompting user input is corresponding with this request of access;
Judge that whether the physical operations that user inputs is consistent with the physical operations obtained from corresponding table;
If consistent, perform and the encryption and decryption of memory assembly is operated.
6. encipher-decipher method as claimed in claim 5, wherein this correspondence preserves the corresponding relation that memory assembly zones of different and physical certifying operate in showing.
7. encipher-decipher method as claimed in claim 5, this request of access comprises the instruction conducted interviews to which region of memory assembly.
8. encipher-decipher method as claimed in claim 5, also comprises the operation in advance memory assembly being carried out to Region dividing, by corresponding with physical operations for the region divided, and preserves the corresponding table of memory assembly zones of different and physical operations.
9. encipher-decipher method as claimed in claim 5, encryption and decryption operation wherein comprises:
The data of write memory assembly are encrypted, and when mainboard reads the data of memory assembly to data deciphering.
10. a bridge chip card encrypting and deciphering system, comprises mainboard and memory assembly, and the bridge-type deciphering chip card as described in claim 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510419338.5A CN104951689B (en) | 2015-07-17 | 2015-07-17 | Bridge-type deciphering chip card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510419338.5A CN104951689B (en) | 2015-07-17 | 2015-07-17 | Bridge-type deciphering chip card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104951689A true CN104951689A (en) | 2015-09-30 |
CN104951689B CN104951689B (en) | 2018-05-18 |
Family
ID=54166342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510419338.5A Expired - Fee Related CN104951689B (en) | 2015-07-17 | 2015-07-17 | Bridge-type deciphering chip card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104951689B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853343A (en) * | 2009-03-31 | 2010-10-06 | 巴比禄股份有限公司 | Memory storage |
CN102184144A (en) * | 2011-04-27 | 2011-09-14 | 中国人民解放军炮兵学院南京分院 | Hardware-encryption mobile hard disk drive and application method thereof |
WO2012153144A2 (en) * | 2011-05-11 | 2012-11-15 | Future Upgrades Limited | Controlling access to data storage means |
CN103164666A (en) * | 2011-12-16 | 2013-06-19 | 三星电子株式会社 | Method of generating authentication information for a memory device, an external device and system icluding the external device |
CN103201746A (en) * | 2010-11-08 | 2013-07-10 | 英特尔公司 | Techniques for security management provisioning at a data storage device |
-
2015
- 2015-07-17 CN CN201510419338.5A patent/CN104951689B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853343A (en) * | 2009-03-31 | 2010-10-06 | 巴比禄股份有限公司 | Memory storage |
CN103201746A (en) * | 2010-11-08 | 2013-07-10 | 英特尔公司 | Techniques for security management provisioning at a data storage device |
CN102184144A (en) * | 2011-04-27 | 2011-09-14 | 中国人民解放军炮兵学院南京分院 | Hardware-encryption mobile hard disk drive and application method thereof |
WO2012153144A2 (en) * | 2011-05-11 | 2012-11-15 | Future Upgrades Limited | Controlling access to data storage means |
CN103164666A (en) * | 2011-12-16 | 2013-06-19 | 三星电子株式会社 | Method of generating authentication information for a memory device, an external device and system icluding the external device |
Also Published As
Publication number | Publication date |
---|---|
CN104951689B (en) | 2018-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6882254B2 (en) | Safety verification methods based on biological characteristics, client terminals, and servers | |
KR101284481B1 (en) | Authentication method and device using OTP including biometric data | |
US9166796B2 (en) | Secure biometric cloud storage system | |
EP2628133B1 (en) | Authenticate a fingerprint image | |
CN106452770B (en) | Data encryption method, data decryption method, device and system | |
CN107294900A (en) | Identity registration method and apparatus based on biological characteristic | |
US20130262876A1 (en) | Method, Apparatus, and System for Performing Authentication on Bound Data Card and Mobile Host | |
CN106612180A (en) | Method and device for realizing session identifier synchronization | |
WO2017202025A1 (en) | Terminal file encryption method, terminal file decryption method, and terminal | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
US20150254912A1 (en) | DNA based security | |
KR20160144375A (en) | Method and apparatus of verifying usability of biological characteristic image | |
US20200233947A1 (en) | System and method for facilitating authentication via a short-range wireless token | |
KR101630462B1 (en) | Apparatus and Method for Securing a Keyboard | |
JP6167667B2 (en) | Authentication system, authentication method, authentication program, and authentication apparatus | |
JP2006285697A (en) | File management method and file management system | |
CN107392039B (en) | Computer hard disk data encryption method and device | |
CN104951689A (en) | Bridge type encryption and decryption chip card | |
CN108985409B (en) | Identity card information reading method and device and electronic equipment | |
KR101809976B1 (en) | A method for security certification generating authentication key combinating multi-user element | |
KR101498974B1 (en) | Security management server, system, and method usdion biometric informatio | |
KR100742778B1 (en) | Method for user certification using radio frequency identification signature, recording medium thereof and apparatus for user certification using radio frequency identification signature | |
CN114091088B (en) | Method and apparatus for improving communication security | |
CN110659522B (en) | Storage medium security authentication method and device, computer equipment and storage medium | |
WO2022255151A1 (en) | Data management system, data management method, and non-transitory recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180509 Address after: 510000 No. 203, south suburb Road, South Bridge, Panyu District bridge, Guangzhou, Guangdong, 203 (for office use only) Applicant after: Guangdong Micro Technology Co., Ltd. Address before: 4, 3 staircase, 1302 room, No. 1, Yang Hu West Road, Mingyue Mountain Stream Road, Wenquan Town, Conghua, Guangdong Applicant before: Wang Jingchun |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180518 Termination date: 20190717 |